[ 53.028787][ T26] audit: type=1800 audit(1572883047.304:26): pid=7972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 53.086519][ T26] audit: type=1800 audit(1572883047.314:27): pid=7972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 53.110188][ T26] audit: type=1800 audit(1572883047.314:28): pid=7972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.815007][ T26] audit: type=1800 audit(1572883048.114:29): pid=7972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.222' (ECDSA) to the list of known hosts. 2019/11/04 15:57:34 fuzzer started 2019/11/04 15:57:36 dialing manager at 10.128.0.105:42499 2019/11/04 15:57:36 syscalls: 2553 2019/11/04 15:57:36 code coverage: enabled 2019/11/04 15:57:36 comparison tracing: enabled 2019/11/04 15:57:36 extra coverage: extra coverage is not supported by the kernel 2019/11/04 15:57:36 setuid sandbox: enabled 2019/11/04 15:57:36 namespace sandbox: enabled 2019/11/04 15:57:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 15:57:36 fault injection: enabled 2019/11/04 15:57:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 15:57:36 net packet injection: enabled 2019/11/04 15:57:36 net device setup: enabled 2019/11/04 15:57:36 concurrency sanitizer: enabled 2019/11/04 15:57:36 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 67.970011][ T8141] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/04 15:57:44 adding functions to KCSAN blacklist: 'tick_nohz_idle_stop_tick' 'snapshot_refaults' 'find_next_bit' 'run_timer_softirq' 'rcu_gp_fqs_check_wake' 'pipe_poll' 'rcu_gp_fqs_loop' 'dd_has_work' 'blk_mq_sched_dispatch_requests' 'blk_mq_get_request' 'kauditd_thread' 'audit_log_start' 'xas_find_marked' 'generic_permission' 'p9_poll_workfn' 'vm_area_dup' 'mod_timer' 'copy_process' 'add_timer' 'find_get_pages_range_tag' 'task_dump_owner' 'taskstats_exit' 'do_exit' 'tick_sched_do_timer' 'inet_putpeer' 'generic_write_end' 'ext4_nonda_switch' 'wbt_issue' 'tick_do_update_jiffies64' 'ep_poll' 'ext4_free_inode' 'page_counter_try_charge' 'blk_mq_dispatch_rq_list' 'do_nanosleep' '__ext4_new_inode' 'tcp_add_backlog' 'poll_schedule_timeout' 'ext4_has_free_clusters' 'pid_update_inode' 'do_wait' '__skb_try_recv_from_queue' 'sctp_assoc_migrate' 'ext4_mark_iloc_dirty' 'snd_ctl_notify' 'hrtimer_wakeup' 'tomoyo_supervisor' '__hrtimer_run_queues' 'ktime_get_real_seconds' 'ktime_get_seconds' 'get_task_cred' 'mem_cgroup_select_victim_node' 15:58:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000240)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_vs\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) 15:58:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$user(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000200)="23bf04b7cbeb7f119292d9990590934023bfc066c4ac62e72a1d4149ee6715d588f9e67ac51ba03899cfed5d25f796557f70ec39ef5d2df30a0925a1c555df65cd27", 0x42, 0x0) ftruncate(r1, 0x1000000) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x24008808) shmdt(0x0) shmdt(0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180), 0x8) socket(0x1, 0x0, 0x40) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000300)={0x0, 0xfffffffd, 0x3, 0x0, 0x81, 0x2, 0x20, 0x1f, {0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x3ff, 0x40, 0x3, 0x5}}, &(0x7f00000003c0)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) [ 130.516620][ T8145] IPVS: ftp: loaded support on port[0] = 21 [ 130.660220][ T8145] chnl_net:caif_netlink_parms(): no params data found [ 130.715172][ T8145] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.723112][ T8145] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.731985][ T8145] device bridge_slave_0 entered promiscuous mode [ 130.740374][ T8145] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.747581][ T8145] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.755942][ T8145] device bridge_slave_1 entered promiscuous mode 15:58:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x26000000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') setns(r2, 0x0) [ 130.777165][ T8145] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 130.789332][ T8145] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 130.792780][ T8148] IPVS: ftp: loaded support on port[0] = 21 [ 130.811939][ T8145] team0: Port device team_slave_0 added [ 130.819212][ T8145] team0: Port device team_slave_1 added [ 130.902339][ T8145] device hsr_slave_0 entered promiscuous mode [ 130.939119][ T8145] device hsr_slave_1 entered promiscuous mode [ 130.995793][ T8150] IPVS: ftp: loaded support on port[0] = 21 [ 131.116678][ T8145] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.124071][ T8145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.131770][ T8145] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.138871][ T8145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.409581][ T8148] chnl_net:caif_netlink_parms(): no params data found 15:58:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000200)=0x5191, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) flock(0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0x1, 0x2) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) geteuid() fcntl$getownex(r4, 0x10, 0x0) getresgid(0x0, &(0x7f00000008c0), &(0x7f0000000900)) lstat(0x0, &(0x7f0000000c00)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001840), &(0x7f0000001880)=0xc) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fstat(r7, &(0x7f0000000d00)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 131.528534][ T8145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.582177][ T8148] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.650473][ T8148] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.669914][ T8148] device bridge_slave_0 entered promiscuous mode [ 131.712972][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.750311][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.790244][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 131.845049][ T8145] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.890193][ T8148] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.897340][ T8148] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.932068][ T8148] device bridge_slave_1 entered promiscuous mode [ 131.961608][ T8150] chnl_net:caif_netlink_parms(): no params data found [ 131.981207][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.999400][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.036603][ T8180] IPVS: ftp: loaded support on port[0] = 21 [ 132.064466][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.089589][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.119574][ T8178] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.126718][ T8178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.205468][ T8150] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.258798][ T8150] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.288927][ T8150] device bridge_slave_0 entered promiscuous mode [ 132.304879][ T8150] bridge0: port 2(bridge_slave_1) entered blocking state 15:58:46 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESHEX], 0x227) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) [ 132.348798][ T8150] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.363455][ T8150] device bridge_slave_1 entered promiscuous mode [ 132.397267][ T8148] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 132.451133][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.471298][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.519522][ T3511] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.526623][ T3511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.582742][ T8148] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 132.623577][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.669949][ T8150] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 132.799181][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.819697][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.860316][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.880072][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.905633][ T8150] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 132.930365][ T8182] IPVS: ftp: loaded support on port[0] = 21 [ 132.943914][ T8148] team0: Port device team_slave_0 added [ 132.951634][ T8148] team0: Port device team_slave_1 added [ 132.958881][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.968560][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.983530][ T8145] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 132.994912][ T8145] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 15:58:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb, @str='\x02\xac\x0f\x00me_type\x00'}]}, 0x269}}, 0x0) [ 133.025050][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.034251][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.043625][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.055411][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.123358][ T8148] device hsr_slave_0 entered promiscuous mode [ 133.171149][ T8148] device hsr_slave_1 entered promiscuous mode [ 133.208899][ T8148] debugfs: Directory 'hsr0' with parent '/' already present! [ 133.235055][ T8150] team0: Port device team_slave_0 added [ 133.241851][ T8150] team0: Port device team_slave_1 added [ 133.247618][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.256360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.265333][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.312681][ T8145] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.325736][ T8192] IPVS: ftp: loaded support on port[0] = 21 [ 133.343898][ T8180] chnl_net:caif_netlink_parms(): no params data found [ 133.414917][ T8150] device hsr_slave_0 entered promiscuous mode [ 133.459096][ T8150] device hsr_slave_1 entered promiscuous mode [ 133.518883][ T8150] debugfs: Directory 'hsr0' with parent '/' already present! [ 133.696192][ T8180] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.740444][ T8180] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.748367][ T8180] device bridge_slave_0 entered promiscuous mode [ 133.872784][ T8182] chnl_net:caif_netlink_parms(): no params data found [ 133.945719][ T8180] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.958836][ T8180] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.971932][ T8180] device bridge_slave_1 entered promiscuous mode [ 134.075883][ T8148] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.166540][ T8148] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.261862][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.300284][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.341888][ T8180] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 134.431895][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.453981][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.505421][ T3511] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.512559][ T3511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.586067][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.633192][ T3511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.691054][ T3511] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.698230][ T3511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.843629][ T8180] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.855372][ T8182] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.869098][ T8182] bridge0: port 1(bridge_slave_0) entered disabled state 15:58:49 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000240)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_vs\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) [ 134.922473][ T8182] device bridge_slave_0 entered promiscuous mode [ 134.969408][ T8192] chnl_net:caif_netlink_parms(): no params data found [ 135.032107][ T8150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.049667][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 135.057688][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 135.136924][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 135.177948][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 135.242916][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 135.295183][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.333978][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.387602][ T8148] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 135.451079][ T8148] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 135.514595][ T8182] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.531003][ T8182] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.583353][ T8182] device bridge_slave_1 entered promiscuous mode [ 135.638081][ T8150] 8021q: adding VLAN 0 to HW filter on device team0 [ 135.689691][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.771571][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:58:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000240)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_vs\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x33d, 0x700) [ 135.830244][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.919573][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.928073][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.999460][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.028632][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.134508][ T8182] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 136.197312][ T8148] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 136.237086][ T8180] team0: Port device team_slave_0 added [ 136.262783][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 136.309685][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 136.329981][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 136.351365][ T8208] ================================================================== [ 136.359528][ T8208] BUG: KCSAN: data-race in pipe_wait / put_pipe_info [ 136.366185][ T8208] [ 136.368523][ T8208] read to 0xffff8880b790e1cc of 4 bytes by task 8209 on cpu 1: [ 136.376064][ T8208] pipe_wait+0xd7/0x140 [ 136.380246][ T8208] pipe_read+0x3b1/0x5e0 [ 136.384486][ T8208] new_sync_read+0x389/0x4f0 [ 136.389083][ T8208] __vfs_read+0xb1/0xc0 [ 136.393233][ T8208] vfs_read+0x143/0x2c0 [ 136.397385][ T8208] ksys_read+0xd5/0x1b0 [ 136.401534][ T8208] __x64_sys_read+0x4c/0x60 [ 136.406036][ T8208] do_syscall_64+0xcc/0x370 [ 136.410542][ T8208] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 136.416415][ T8208] [ 136.418741][ T8208] write to 0xffff8880b790e1cc of 4 bytes by task 8208 on cpu 0: [ 136.426368][ T8208] put_pipe_info+0x4d/0xb0 [ 136.430779][ T8208] pipe_release+0x152/0x1b0 [ 136.435274][ T8208] __fput+0x1e1/0x520 [ 136.439247][ T8208] ____fput+0x1f/0x30 [ 136.443222][ T8208] task_work_run+0xf6/0x130 [ 136.447721][ T8208] exit_to_usermode_loop+0x2b4/0x2c0 [ 136.453014][ T8208] do_syscall_64+0x353/0x370 [ 136.457603][ T8208] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 136.463479][ T8208] [ 136.465792][ T8208] Reported by Kernel Concurrency Sanitizer on: [ 136.471942][ T8208] CPU: 0 PID: 8208 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 136.478692][ T8208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.488746][ T8208] ================================================================== [ 136.496814][ T8208] Kernel panic - not syncing: panic_on_warn set ... [ 136.503406][ T8208] CPU: 0 PID: 8208 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 136.510203][ T8208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.520267][ T8208] Call Trace: [ 136.523578][ T8208] dump_stack+0xf5/0x159 [ 136.527827][ T8208] panic+0x210/0x640 [ 136.533566][ T8208] ? vprintk_func+0x8d/0x140 [ 136.538172][ T8208] kcsan_report.cold+0xc/0xe [ 136.542785][ T8208] kcsan_setup_watchpoint+0x3fe/0x410 [ 136.548163][ T8208] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 136.553986][ T8208] __tsan_unaligned_write4+0x143/0x1f0 [ 136.559446][ T8208] put_pipe_info+0x4d/0xb0 [ 136.563865][ T8208] pipe_release+0x152/0x1b0 [ 136.568379][ T8208] __fput+0x1e1/0x520 [ 136.572366][ T8208] ? put_pipe_info+0xb0/0xb0 [ 136.576959][ T8208] ____fput+0x1f/0x30 [ 136.580941][ T8208] task_work_run+0xf6/0x130 [ 136.585447][ T8208] exit_to_usermode_loop+0x2b4/0x2c0 [ 136.590743][ T8208] do_syscall_64+0x353/0x370 [ 136.595353][ T8208] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 136.601245][ T8208] RIP: 0033:0x7f26200012b0 [ 136.605674][ T8208] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 136.625380][ T8208] RSP: 002b:00007ffda8f5a8f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 136.633794][ T8208] RAX: 0000000000000000 RBX: 00007f26202b67a0 RCX: 00007f26200012b0 [ 136.641764][ T8208] RDX: 00007f26202b7df0 RSI: 0000000000000001 RDI: 0000000000000001 [ 136.649750][ T8208] RBP: 0000000000000000 R08: 00007f26206fa700 R09: 00007f26206fa700 [ 136.657721][ T8208] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 136.665686][ T8208] R13: 0000000000000001 R14: 0000000001834160 R15: 0000000000000000 [ 136.675266][ T8208] Kernel Offset: disabled [ 136.679596][ T8208] Rebooting in 86400 seconds..